1) Use the delete key
- Using the delete key is the simplest solution especially if you only receive a low number of unwanted emails.
2) Use filter option
-If you are aware, many email packages offer the ability to filter incoming mail. So based on the rules you supply , you may be able to detect spam once it is downloaded. In addition, spam messages can then be deleted automatically or stored in a separate folder so you can check it to ensure that they are really spam before deleting them.
3) Use separate email accounts
- You can use different address for forms you fill out on the Internet. Once maintaining a set of email addresses, this will enable you to monitor how spammers are getting hold of your addresses.
4) Don't pass spam emails to your friends
- Before suggesting a friend or relative for a particular service ask them first, if they are really interested, let them subscribe it themselves. Besides that, if your sending an email to a group of people, put their email addresses in the BCC (Blind Carbon Copy) field to keep them confidential.
5) Report it
- You can contact the spammer's ISP (Internet Service Provider) and alert them to the fact that one of their users is spamming from their domain. Bear in mind that the majority of unsolicited mail has forged return address information, so the To:, From:, and Reply-To: addresses are not the actual source of the message. To trace the real culprit you need to extract the information needed from the "message header" of the mail. In Outlook 2000 do the following:
- Highlight the suspect email message
- Go to View > Options
- At the bottom of the Options window, you will see "Internet Headers"
- Highlight the text in the Internet Header window (by clicking in the window, then pressing Ctrl-A or Right Click then select all)
- When you have highlighted all the text in the window, Right Mouse Click and select Copy
- Close that window (Internet headers) then click on the icon to forward the email message
- In the forwarded message window Right Mouse Click. This time, select Paste. This will copy the message header information to the forwarded message
- Look at the first line of the header that says Received from or Return path and you should see an email address in the form of Mailbox@domain.com. Address your email to postmaster@domain.com, briefly (and politely) explain that you are getting unsolicited emails from one of their users and they should take it from there.
Corporate Fraud
So, to avoid the risk from long firm fraud, make sure that any sudden large orders from relatively short-term relationship are to be carefull to deal with and questioned. It is also prudent to investigate companies with whom you are building relationships, especially as their demands increase. You could also find out about the individuals heading these companies and find out if they have been connected with any dissolved companies in the past. By finding out as much as you can about the business and applying the right amount of common sense, you are preparing your company to protect itself against fraud.
Hackers
Hackers are always looking for a way to get into computers of other persons. It can be something as simple as phising confidential infromation ( like credit card or bank account numbers) to complex hacking routines that use your computer as a repository for illegal content (like music or movies with copyright)
However, there is no magical software to prevent hackers; and it will never exist. It doesnt matter how much money or resources you invest in designing the perfect system, someone will find the way to crack it. We can try to prevent hackers by;
1) OS Updates
- You must assure yourself that all your software is up to date. Especially your operating system and your web browser. Why? Because they are the two things that hackers will try to attack first if they want to get into your computer
2) Firewalling
- Internet firewall hacker protection has become so necessary that Microsoft now ships it for free as part of their Windows XP operating system.
3) Anti Spyware/ Adware
- Companies from around the world decided to create programs that could pick up data from your computer in order to acquire information for their database. It may not be as dangerous as a virus, but it is an intrusion to your privacy. Wipe them out with this piece of software.. ;)
No comments:
Post a Comment